Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval

Size: px
Start display at page:

Download "Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval"

Transcription

1 Bridging the P2P and WWW Divide with DISCOVIR - DIStributed COntent-based Visual Information Retrieval Ka Cheung Sia Siu Kong Chan Cheuk Hang Ng Lai Yin Ho Chi Hang Chan Irwin King Department of Computer Science and Engineering The Chinese University of Hong Kong Shatin, N.T., Hong Kong SAR ABSTRACT In the light of image retrieval evolving from text annotation to content-based and from standalone applications to web-based search engines, we foresee the need for deploying content-based image retrieval (CBIR) into Peer-to-Peer (P2P) architecture. By doing so, we not only distribute the tasks of feature extraction, indexing and storage of image data into peers, we also introduce another aspect of searching in addition to filename-based method in prevalent P2P applications. Through the deployment of DISCOVIR, we introduce a model to improve query efficiency targeting on content-based search. Current P2P applications require installing special purpose software and proprietary protocols for information retrieval, which limit the number of audience. To make use of the WWW to increase popularity of P2P, we propose DISCOVIR Everywhere to bridge the two different worlds, P2P and WWW. We outline the process of accessing DIS- COVIR network through web browsers or mobile devices, by the coordination of a light weighted gateway, with reduced workload compared to existing methodology. Categories and Subject Descriptors H.3.4 [Information Storage and Retrieval]: Systems and Software; H.4.3 [Information Systems Applications]: Communications Applications General Terms Design Keywords peer-to-peer; content-based image retrieval; web integration; mobility 1. INTRODUCTION Copyright is held by the author/owner(s). WWW2003, May 20 24, 2003, Budapest, Hungary. ACM xxx. The appearance of Peer-to-Peer (P2P) applications in recent years have demonstrated the significance of distributed information sharing systems by offering the advantages of scalable storage space. Regarding to current content-based image retrieval (CBIR) systems, we envisage the potential use of P2P network in both scattering data storage and distributing workload of feature extraction and indexing. Through the realization of CBIR in P2P network, we can support enormous image collection without installing highend database and hardware for the web server. Also, we make use of the computation power of peers in addition to data storage. On the other hand, we revolutionize the way of searching in current P2P architecture. The queries in P2P are mostly based on text, entered by users to describe shared files. The accuracy of retrieval depends mainly on whether users can come up with a common description on a file. CBIR raise another aspect of searching in P2P other than filename-based search. We also formulate a query model that improves query efficiency under the content-based search architecture and reveal the research need for improving query efficiency. Moreover, to improve the availability of P2P, we need to bridge the P2P and WWW for P2P to grow and gain popularity. To address the desirabilities of P2P application raised above, we introduce the DIStributed COntent-based Visual Information Retrieval (DISCOVIR) [5] system and DISCOVIR Everywhere with the following characteristics: 1. DISCOVIR extends current CBIR system into P2P fashion and achieve the utilization of both data storage and computation resource at the same time. 2. Queries in DISCOVIR are no longer based on filenames but on the content of images. The need for annotating shared files is waived, thus, query accuracy does not depend on subjective perception of keywords. 3. DISCOVIR Everywhere provides a gateway for web and mobile users to access the DISCOVIR network. This architecture get rid of problems exist in current web-based P2P service by tightly integrating the web and P2P.

2 In the next section, we will detail the related works in CBIR and P2P, and justify the motivation and necessity of combining them. In Section 3, we introduce the architecture of DISCOVIR and the functionality of its components. In Section 4, DISCOVIR Everywhere is introduced as an extension to DISCOVIR. We describe details of current implementations and future works in Section 5. Lastly, we give concluding remarks in Section RELATED WORKS In early image retrieval system, it requires human annotation and classification on the image collection, the query is thus performed using text-based information retrieval method. However, there are several limitations for such implementation, they are: Human Intervention - Human intervention is required to describe and annotate the content of images, which is tedious and potentially error-prone. Non-Standard Description - As the size of image database grows, limited keywords results in inadequacy for describing the image content. Moreover, the keywords used are subjective and not unique. Different users may use different keywords to annotate the same image. Unlike the client-server architecture of the web, the P2P network aims at allowing individual computer, which joins and leaves the network frequently, to share information directly with each other without the help of dedicated servers. In these networks, a peer can become a member of the network by establishing a connection with one or more peers in the current network. Messages are sent over multiple hops from one peer to another while each peer responds to queries for information it shares locally. Meanwhile, some current researches [29, 23] focus on improving query efficiency on filename-based search and we address this problem in the notion of content-based search [21, 26] in earlier works. The motivation of proposing DISCOVIR is to migrate traditional CBIR to a P2P network as a step to introduce content-based search in P2P. With the advantages of P2P network, we utilize not only the distributed data storage, but also the computation power of each peer for the preprocessing and indexing of images. In order to improve the accessibility of P2P network, we further elaborate on current web-based P2P services and propose DISCOVIR Everywhere to provide web interface for users to carry out CBIR in P2P network. Linguistic Barriers - If the image database is to be shared globally around the world, the retrieval of images will be ineffective when different languages are used in the description. It is difficult to map semantically equivalent words across different languages. In order to solve these problems, CBIR is proposed to pass such tedious task to computer. Since early 1990 s, many CBIR systems have been proposed and developed, some of them are QBIC [6], WebSEEK [28], SIMPLIcity [30], MARS [17], Photobook [22], WALRUS [20] and other systems for some domain specific applications [13, 12]. These systems are not designed to be distributed across different computers in a network. One of the shortcomings is that the feature extraction, indexing and also the query processing are all done in a centralized fashion which is computationally intensive and difficult to scale up. As indicated by several researchers [24, 27], one of the promising future trends in CBIR includes the distribution of data collection, data processing and information retrieval. By extending the centralized system model, we not only can increase the size of image collections easily, but we also overcome the scalability bottleneck problem by distributing the process of feature extraction and retrieval. P2P network is a recently evolved paradigm for distributed computing. With the emerging P2P networks and various implementations such as Gnutella [8], Napster [19], LimeWire [14], YouServ [3], Freenet [7], Morpheus [18] and KaZaA [11], they focus on the retrieval of data based on filenames or metadata, such as ID3 tag of MP3, and offer the advantages of distributed resource [25], increased reliability [4] and comprehensiveness of information [15]. Figure 1 shows an example of a typical P2P network. In the example, different files are shared by different peers. When a peer initiates a search for a file, it broadcasts a query request to all its connecting peers. Its peers then propagate the request to their connected peers and this process continues. Figure 1: P2P information retrieval 3. ARCHITECTURE OF DISCOVIR In this section, we will describe the architecture of a DIS- COVIR client and the communication protocol in order to perform CBIR over a P2P network. Through the DIS- COVIR program, users can share images among peers around the world. Each peer is responsible for extracting and indexing the feature of the shared images, by doing so, every peers can search for similar images based on image content, like color, texture and shape among images shared by all DISCOVIR peer in the network. Figure 2 depicts the key components and their interaction in the architecture of a DISCOVIR client. As DISCOVIR is derived from LimeWire [14] open source project, the operations of Connection Manager, Packet Router and HTTP Agent remain more or less the same with additional functionality to improve the query mechanism used in original Gnutella network. Plug-in Manager, Feature Extractor and Image Indexer are introduced to support the CBIR task.

3 The User Interface is modified to incorporate the image search panel, Figure 3 shows a screen capture of DISCOVIR in the image search page. Here are the brief descriptions of each component: Connection Manager - It is responsible for setting up and managing the TCP connection between DIS- COVIR clients. Packet Router - It masters the routing of message in DISCOVIR network between components and peers. Plug-in Manager - It coordinates the storage of different feature extraction modules and their interaction with Feature Extractor and Image Indexer. HTTP Agent - It is a tiny web-server that handles file download request from other DISCOVIR peers using HTTP protocol. Feature Extractor - It collaborates with the Plugin Manager to perform various feature extraction and thumbnail generation of the shared image collection. Image Indexer - It indexes the image collection by content feature and carry out clustering to speed up the retrieval of images. Bootstrap Server - It maintains an update list of currently available DISCOVIR peers. Connection Manager Packet Router DISCOVIR Network DISCOVIR User Interface DISCOVIR Core Plug-in Manager WWW HTTP Agent Feature Extractor Image Indexer Image Manager Shared Collection Figure 2: Architecture of DISCOVIR Figure 3: Screen Capture of DISCOVIR 3.1 Flow of Operations and Functionality of DISCOVIR Components The following is a scenario walk-through to demonstrate the interaction between components. When a user chooses to preprocess his image collection, the Feature Extractor collaborates with Plug-in Manager to extract content feature and generate thumbnails from all images in the shared directory. The result is passed to Image Indexer for indexing and clustering purposes. In case when a new DISCOVIR client wants to join the network, the Connection Manager asks a Bootstrap server for a list of currently available DISCOVIR clients in order to hook up to the network. Once a user initiates a query for similar images, the Feature Extractor extracts feature from the example image instantly, Packet Router is responsible for assembling an ImageQuery message and sending out to the DISCOVIR network. For instance, when an ImageQuery message is received from other peers, the Packet Router checks for any duplication and propagates to other peers through DISCOVIR network. Meanwhile, it passes the message to Image Indexer for searching similar images. Upon similar images are found, an ImageQueryHit message is assembled and passed to Packet Router for replying the initiating peer. When ImageQueryHit messages return to the initiating peer, its HTTP Agent downloads thumbnails or full size images from other peers upon receiving user request from the user interface Preprocessing Plug-in Manager is responsible for contacting web-site of DISCOVIR to inquire the list of available feature extraction modules, it will download and install selected modules upon user request. Currently, DISCOVIR supports various feature extraction methods in color and texture categories such as AverageRGB, GlobalColorHistogram, ColorMoment, Cooccurrence matrix, etc [10]. All feature extraction modules strictly follow a predefined interface in order to realize the polymorphic properties of switching between different plugins dynamically, see Fig. 7. Feature Extractor will extract feature and generate thumbnails for all images in the shared collection by using a particular feature extraction module. Let I represent a raw image data, f be the feature extraction method, the feature extractor perform the task illustrated in Eq. 1, f : I θ I (1) where θ is the feature extraction parameter and I is the extracted feature vector. Image Indexer will then index the image collection using the multi-dimensional feature vectors I in order to answer an incoming query. It also clusters the set of feature vector for the sake of improving query efficiency by acquiring statistical distribution information of the local image collection [26]. Compared with the centralized web-based CBIR approach, sharing the workload of this computational costly task among peers by allowing them to store and index their own image collection helps solving the bottle-neck problem by utilizing distributed computing resources Connection Establishment For a peer to join the DISCOVIR network, it connects to the Bootstrap Server using the Connection Manager. The Bootstrap Server is responsible for storing a finite list of IP address of peers currently in the DISCOVIR network and

4 randomly picks an IP address to return to the peer. Once the IP address is received, the peer is able to hook up to the DISCOVIR network by connecting to the selected peer. In order to provide the Bootstrap Server with update list of IP address, the Connection Manager of each peer sends an alive message to the bootstrap server periodically after it has connected to the DISCOVIR network Query Message Routing After a peer joins the DISCOVIR network, it may initiate a query for similar images. The Feature Extractor processes the query image instantly and assemble an ImageQuery message to be sent out through Packet Router. Likewise, when other peers receive the ImageQuery messages, they need to perform two operations, Query Message Propagation and Local Index Look Up. Query Message Propagation - In order to prevent query messages from looping forever in the DISCOVIR network, two mechanisms are inherited from Gnutella, namely, the Gnutella replicated message checking rule and Time-To-Live (TTL) of messages. The replicated message checking rule can prevent a peer from propagating the same query message again. The TTL mechanism constrains the horizon of a query message able to reach. After these two checkings, the query message will be propagated to linked peers through Packet Router. Local Index Look Up - The peer searches its local index of shared files for similar images using the Image Indexer. Once similar images are retrieved, the peer delivers an ImageQueryHit message back to the requester through Packet Router. Since images indexing is performed on the peer in preprocessing stage, the searching time can be speeded up Query Result Display When an ImageQueryHit message returns to the requester, user will obtain a list detailing the location and size of matched images. In order to retrieve the query result, the HTTP Agent will download thumbnails or full size image from the peer using HTTP protocol. On the other hand, HTTP Agent in other peers will serve as a web server to deliver the requested images. This HTTP Agent is essential for integration to WWW which will be described later in detail. 3.2 Query Efficiency To address the efficiency problem in query messages routing, we propose the use of Firework Query Model (FQM) [21, 26]. In FQM, peers sharing similar content will be clustered together like a Yellow pages. When a peer initiates or receives a query message, the query is routed selectively according to the content of the query. Once it reaches its designated cluster, the query message is broadcasted by peers inside the cluster much like an exploding firework as shown in Fig. 4. This strategy aims to minimize the number of messages passing through the network, reduce the workload of each computer and maximize the ability of retrieving relevant data from the P2P network Peer Clustering Figure 4: Illustration of firework query. In order to help building the DISCOVIR as a self-organized network oriented in content affinity, we perform peer clustering at the level of overlaying network topology. The peer clustering algorithm introduced in FQM consists of three steps: 1. Signature Value Calculation Every peer preprocess its data collection as described in Section and divide the whole data set into sub-clusters by a clustering algorithm, e.g. k-means, competitive learning, and expectation maximization. A signature value sig v will be calculated for each sub-cluster to characterize its data properties. Since the selection of clustering algorithm and its parameters can result in different number of sub-clusters. The number of signature values is variable and is a trade-off between data characteristic resolution and computational cost. 2. Neighborhood Discovery After a peer joined the DISCOVIR network with the procedure described in Section 3.1.2, it broadcasts a signature query message, similar to that of ping-pong messages in Gnutella, to reveal the location and data characteristic of its neighborhood. This task is not only done when a peer first joins the network, it repeats every certain interval in order to maintain the latest information of other peers. 3. Attractive Connection Establishment By acquiring the signature values of other peers, one can reveal the peer with highest data affinity (similarity) to itself, and make an attractive connection to link them up. When an existing attractive connection breaks, a peer should check its host cache, which contains signature values of other peers found in the neighborhood discovery stage, and reestablish the attractive connection using peer clustering algorithm again. Having all peers joining the DISCOVIR network perform the three tasks described above, one can envision a P2P network with self-organizing ability to be constructed. The detail steps of peer clustering is illustrated in Algorithm Selective Query Message Routing The main goal of query message routing algorithm in P2P network is to minimize the number of message passing, while maximize the ability of retrieving relevant data. Here, we introduce the algorithm used in FQM to determine when and how a query message is propagated. The query message routing algorithm used in FQM is different from the one described in Section in how to

5 Algorithm 1 Algorithm for peer clustering Peer-Clustering(peer v, integer ttl) for all signature value sig v in peer v do for all peer w in discovered neighbors do for all signature value sig w in peer w do Compute Distance(sig v, sig w) end for end for establish attractive connection between v and w having min(distance(sig v, sig w)) end for Image Query Hit 0x81 Number of Hits Port IP Address Speed Result Set Servant Identifier n n+16 File Index File Size File Name 0 Thumbnail information, similarity Figure 6: ImageQueryHit message format 0 select a peer for the query message to route to. In FQM, the distance between the signature value of a peer and the query, Distance(sig v, q), is measured. If it is smaller than a preset threshold, θ, the peer will propagate the query to its neighbors through normal connections. Otherwise, if one or more Distance(sig v, q) is within the threshold, it implies the query has reached its target cluster. Therefore, the query will be propagated through corresponding attractive connections much like an exploding firework. The detail steps of the algorithm is illustrated in Algorithm 2. Algorithm 2 Algorithm for the Firework Query Model Firework-query-routing (peer v, query q) for all signature value sig v in peer v do if Distance(sig v, q) < θ (threshold) then if q ttl > 0 then propagate q using attractive links end if end if end for if Not forwarding to attractive link then if q ttl > 0 then forward q using normal links end if end if q ttl = q ttl Gnutella Message Modification The DISCOVIR system is built compatible to the Gnutella network. In order to support the image query functionalities mentioned above, two types of messages are added. They are: ImageQuery - Special type of the Query message. It is to carry name of feature extraction method and feature vector of query image, see Fig. 5 ImageQueryHit - Special type of the QueryHit message. It is to respond to the ImageQuery message, it contains the location, filename and size of similar images retrieved, and their similarity measure to the query. Besides, the location information of corresponding thumbnails are added for the purpose of previewing result set in a faster speed, see Fig. 6 Image Query 0x80 Minimum Speed Feature Name 0 Feature Vector Figure 5: ImageQuery message format Figure 7: COVIR Downloading plug-in module for DIS- 4. DISCOVIR EVERYWHERE Although migrating CBIR on P2P network has many advantages as aforementioned, this system still encounters limitations like the requirement of installing client software and the low accessibility compared to WWW. These limitations always introduce inconveniences for the users when they are not using their own computers. For example, when the users are in libraries or cyber-cafes, installing personal software is usually prohibited, therefore, they cannot use the services. For this reason, some web-based P2P applications have been developed. With these services, user can access the P2P network through a web browser while the web server serves as one of the peer in the P2P network. Some examples of webbased P2P applications are AsiaYeah [1], Gnutellait [9], LinkGrinder [16] and AudioFind [2]. When users submit queries through the web page, the server helps distributing the query and collecting the results from the P2P network. Such kind of search engine for file retrieval through P2P network provides an alternative source of files in addition to the documents on WWW. This provides a more comprehensive and larger file database when the number of users in the P2P network is large enough. However, there are drawbacks concerning these models: 1. Centralization - The web server is public to everyone who is able to access the web page. When many users use this service, the server has to handle huge amount of queries and collection of results. The problem remains the same as prevalent search engine. Moreover, the web server will generate lots of traffic to its neighboring peers, which skews the workload in P2P network. 2. CBIR functionality - All the web-based P2P applications mentioned above are based on text search.

6 When adapting to CBIR approach, it will incur lots of penalty when feature extraction of images is done by the server. 4.1 Design Goal of DISCOVIR Everywhere To account for the two problems raised above, DISCOVIR Everywhere overcomes them by distributing the heavy workload to peers evenly while keeping its accessibility through web. Unlike other web-based P2P applications, the web server does not act like a peer in the P2P network. Instead, it coordinates the forwarding of queries and returning of result between web clients and peers. Preprocessing of query image, initiation of query and collection of result are all done in a DISCOVIR peer assigned by the web server. Even there are huge number of user, this architecture is scalable because the web server is only responsible for distributing workload to DISCOVIR client. It allows users to perform CBIR in P2P network through a web browser or a WAP phone. Since the mobile network, the Internet and DISCOVIR are three separate networks running on their own protocols. The idea of DISCOVIR Everywhere is also to bridge three networks together using light weighted access gateways. 4.2 Components in DISCOVIR Everywhere Referring to Fig. 8, we identify the four main components in the DISCOVIR Everywhere design. They are: Web Browsers and Mobile Devices - It is a device running a web browser with network access to the WWW. The mobile devices can be WAP phone or PDAs with wireless access to the DISCOVIR Everywhere Gateway, they can access the web page either by WML or XML. DISCOVIR Peers - They are interconnected computers running the DISCOVIR client program in the Internet. In addition to P2P query service, the HTTP Agent of each peer will accept GET and POST HTTP requests to provide seamless integration with the WWW. Moreover, every DISCOVIR peer is required to send heart-beat message to the Bootstrap Server periodically to indicate their availability in DISCOVIR network. DISCOVIR Bootstrap Server - It is originally the host cache of P2P network in LimeWire. In DIS- COVIR Everywhere, it is responsible for maintaining an updated list of accessible DISCOVIR peers and their availability for providing HTTP access, if it cannot receive the heart-beat message from a peer for a certain period of time, its record will be removed and considered off-line. DISCOVIR Everywhere Gateway - It is a server program providing users with web-based searching interface. It contacts the Bootstrap Server for the list of IP address of available DISCOVIR Peers and coordinates the redirection of users query request to different peers. 4.3 Procedure for Searching Referring to Fig. 9, the process of query in DISCOVIR Everywhere consists of six steps. Details of each step are shown in the following: Figure 8: Architecture of DISCOVIR everywhere 1. A user initiates a query request for similar images through the web interface provided by DISCOVIR Everywhere Gateway. In addition, he also sends the type of feature extraction method he intends to use to the gateway. If the user access the web interface by a WAP phone, he should access it through the WAP Gateway and the medium of communication is WML instead of HTML. 2. The DISCOVIR Everywhere Gateway receives the request and inquire the bootstrap server about the IP address and port number of a DISCOVIR peer capable of handling this query. 3. Upon receiving the inquiry from DISCOVIR Everywhere Gateway, the DISCOVIR Bootstrap Server picks one of the available peers from the list in a round robin manner in order to distribute the workload evenly. This is similar to the techniques used by DNS servers to distribute workload among web servers. 4. Once knowing the IP address of DISCOVIR peer capable of handling the query, the gateway generates a HTML page instantly for users to upload his query image and intended feature extraction method to the selected peers using HTML form submission procedure. 5. User uploads the query image to selected DISCOVIR peer through a HTTP POST request. Meanwhile, the HTTP Agent of that selected peer stores the image and requests its Feature Extractor to extract feature and assemble an ImageQuery message to be sent out through Packet Router, which is analogous to the processing of initiating query using the DISCOVIR client program. The web browser keeps this HTTP connection open until results return from the DISCOVIR peer. 6. Once the selected DISCOVIR peer accumulates up to a certain number of results or reaches a time limit, it packages the result in HTML format and sends back to user through HTTP Agent. With the inherent support of HTTP defined in Gnutella protocol, web users are able to download thumbnails or full size images directly from DISCOVIR peers without the help of gateway.

7 4.4 Advantages of DISCOVIR Everywhere over Prevalent Web-based Search Engine Compared to existing search engines and web-based P2P services, DISCOVIR Everywhere exhibits the following advantages: 1. Comprehensiveness - By utilizing the storage capacity and individual contribution of peers in the network, we increase the comprehensiveness of data archive for searching. Besides, the web-based interface provide a handy access compared to using pre-installed P2P client programs. 2. Query Richness - DISCOVIR Everywhere possess CBIR functionality beyond existing text based retrieval, while eliminates the need for preprocessing, storage and indexing in existing CBIR search engines by delegating them to peers in DISCOVIR network. 3. Scalability - Compared to existing web-based P2P service, the DISCOVIR Everywhere Gateway is much more light weighted. Instead of serving as a proxy for web users to access the P2P network, it takes the role of coordinator between web users and DISCOVIR peers. Apart from reducing the workload for initiation of query and collection of results, this also avoids perverted usage of P2P network by distributing query requests among peers evenly. query, users may draw their own sketch and search. Figure 7 shows the plug-in module download page of DISCOVIR. Currently, DISCOVIR supports AverageRGB, GlobalColorHistogram, LocalColorHistogram, ColorMoment and ColorCoherenceVector on color-based feature, Co-occurrence matrix, Auto correlation, Edge frequency and Primitive length on texture-based feature. We are working on shape-based feature and encourage contributions from the community by implementing plug-ins. DISCOVIR Everywhere Gateway is hosted on a Tomcat server. The HTTP Agent of DISCOVIR client program is modified to support HTTP POST request from web client to accept incoming images. One of the shortcomings in current design depends on trustworthiness of web users. A malicious web user may attack a specific peer with burst of query messages, a key agreement protocol between DIS- COVIR peers, Bootstrap server and DISCOVIR Everywhere gateway should be used to safeguard the peers. With the recent advances in web service technologies, one may envision the marriage of web service and DISCOVIR peer, DISCOVIR Everywhere may adopt the service-oriented architecture (SOA), while the communications between gateway, DISCOVIR peers and web clients all standardized to use SOAP. Figure 10: Top 10 result of retrieval Query Procedure of DISCOVIR Every- Figure 9: where 5. IMPLEMENTATIONS AND FUTURE WORKS We have built a working implementation of DISCOVIR. The client is implemented in Java and makes use of the LimeWire open source project. LimeWire is a Java implementation of Gnutella Network and its key components are under GNU Public License. We have released DISCOVIR as a free software and intend to release the source code in near future. Figure 10 illustrates the top ten results panel, it makes use of the generated thumbnails to avoid heavy traffic caused by downloading full size image directly, while users can preview lower quality images. Figure 11 shows the drawpad functionality of DISCOVIR. Besides supplying an example image for Figure 11: Drawpad functionality of DISCOVIR 6. CONCLUSION

8 In this paper, we marriage the traditional CBIR with the P2P network to distribute storage capacity and workload among peers and provide content-based search in P2P network. We illustrate the design and implementation of DIS- COVIR, in order to exhibit the key components required in a P2P based CBIR system. We also illustrate how its accessibility can be improved by the use of World Wide Web. The DISCOVIR system contains the key components required in a P2P based CBIR system. Connection Manager and Packet Router are used to establish connection and handle query routing. Plug-in Manager, Feature Extractor and Image Indexer are used to extract feature vectors from images, index images and calculate similarly measures. HTTP Agent is used to retrieve images from other peers. We proposed the DISCOVIR Everywhere protocol to deal with the accessibility problem occurring in most prevalent P2P applications. The DISCOVIR Everywhere gateway receives query messages using HTTP protocol and distribute it among different peers using bootstrap server. The DIS- COVIR Everywhere protocol utilize the storage and processing power of each peer instead of the bootstrap server. Thus, the accessibility can be improved while maintaining the scalability of the system. Acknowledgments DISCOVIR is built based on LimeWire open source project. This research work is supported in part by an Earmarked Grant (# ) from the Research Grants Council of Hong Kong, SAR. 7. REFERENCES [1] AsiaYeah Gnutella Search. c.jsp. [2] AudioFind. [3] R. J. J. Bayardo, R. Agrawal, D. Gruhl, and A. Somani. Youserv: A web-hosting and content sharing tool for the masses. In Proceedings of 11th World Wide Web Conference, May [4] G. Coulouris, J. Dollimore, and T. Kindberg. Distributed Systems Concepts and Design. Addison-Wesley, third edition, [5] DIStirbuted COntent-based Visual Information Retrieval. miplab/discovir. [6] C. Faloutsos, R. Barber, M. Flickner, J. Hafner, N. W., D. Petkovic, and W. Equitz. Efficient and Effective Querying by Image Content. Journal of Intelligent Information Systems: Integrating Artificial Intelligence and Database Technologies, 3(3-4): , [7] The Freenet homepage. [8] The Gnutella homepage. [9] Gnutellait Web Search. [10] R. C. Gonzalez and R. E. Woods. Digital Image Processing. Addison Wesley, first edition, [11] KaZaA file sharing network. [12] I. King and Z. Jin. Relevance feedback content-based image retrieval using query distribution estimation based on maximum entropy principle. In Proceedings to the International Conference on Neural Information Processing (ICONIP2001), [13] T. K. Lau and I. King. Montage: An image database for the fashion, clothing, and textile industry in Hong Kong. In Proceedings of the Third Asian Conference on Computer Vision (ACCV 98), Lecture Notes in Computer Science, January 4-7, [14] The LimeWire homepage. [15] Modern Peer-to-Peer File-Sharing over the Internet. [16] LinkGrinder. [17] S. Mehrotra, Y. Rui, M. Ortega, and T. Huang. Supporting Content-based Queries over Images in MARS. In Proc. IEEE Int. Conf. Multimedia Computing and Systems, pages , [18] The Morpheus homepage. [19] The Napster homepage. [20] A. Natsev, R. Rastogi, and K. Shim. WALRUS: A Similarity Retrieval Algorithm for Image Databases. In Proc. SIGMOD, Philadelphia, PA, [21] C. H. Ng and K. C. Sia. Peer Clustering and Firework Query Model. In Poster Proc. of The 11th International World Wide Web Conference, May [22] A. Pentland, R. W. Picard, and S. Sclaroff. Photobook: Tools for Content-based Manipulation of Image Databases. In Proc. SPIE, volume 2185, pages 34 47, February [23] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addressable Network. In In Proc. ACM SIGCOMM, August [24] Y. Rui, T. S. Huang, and S.-F. Chang. Image Retrieval: Current Techniques, Promising Directions and Open Issues. Journal of Visual Communication and Image Representation, 10:39 62, April [25] The Search for Extraterrestrial Intelligence homepage. [26] K. C. Sia, C. H. Ng, C. H. Chan, and I. King. P2P Content-Based Query Routing Using Firework Query Model. In The 2nd International Workshop on Peer-to-Peer Systems, submitted, Feb [27] A. W. Smeulders, M. Worring, S. Santini, A. Gupta, and R. Jai. Content-Based Image Retrieval at the End of the Early Years. IEEE Transaction on Pattern Analysis and Machine Intelligence, 22(12): , December [28] J. R. Smith and S. F. Chang. An Image and Video Search Engine for the World Wide Web. In Proc. SPIE, volume 3022, pages 84 95, [29] I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In Proc. of ACM SIGCOMM, pages , August [30] J. Z. Wang, G. Li, and G. Wiederhold. SIMPLIcity: Semantics-sensitive Integrated Matching for Picture LIbraries. In IEEE Trans. on pattern Analysis and Machine Intelligence, volume 23, pages , 2001.

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam A Survey on P2P File Sharing Systems Using Proximity-aware interest Clustering Varalakshmi.T #1, Arul Murugan.R #2 # Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam

More information

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT

A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT A P2P SERVICE DISCOVERY STRATEGY BASED ON CONTENT CATALOGUES Lican Huang Institute of Network & Distributed Computing, Zhejiang Sci-Tech University, No.5, St.2, Xiasha Higher Education Zone, Hangzhou,

More information

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT

RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT RESEARCH ISSUES IN PEER-TO-PEER DATA MANAGEMENT Bilkent University 1 OUTLINE P2P computing systems Representative P2P systems P2P data management Incentive mechanisms Concluding remarks Bilkent University

More information

Interoperability of Peer-To-Peer File Sharing Protocols

Interoperability of Peer-To-Peer File Sharing Protocols Interoperability of -To- File Sharing Protocols Siu Man Lui and Sai Ho Kwok -to- (P2P) file sharing software has brought a hot discussion on P2P file sharing among all businesses. Freenet, Gnutella, and

More information

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks

A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks 1 A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks Hasan Sözer, Metin Tekkalmaz, and İbrahim Körpeoğlu Abstract File sharing in wireless ad-hoc networks in a peerto-peer manner imposes many

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390

The Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390 The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May

More information

A Reputation Management System in Structured Peer-to-Peer Networks

A Reputation Management System in Structured Peer-to-Peer Networks A Reputation Management System in Structured Peer-to-Peer Networks So Young Lee, O-Hoon Kwon, Jong Kim and Sung Je Hong Dept. of Computer Science & Engineering, Pohang University of Science and Technology

More information

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES

ENHANCED WEB IMAGE RE-RANKING USING SEMANTIC SIGNATURES International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 2, March-April 2016, pp. 24 29, Article ID: IJCET_07_02_003 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=2

More information

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM

A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM A PROXIMITY-AWARE INTEREST-CLUSTERED P2P FILE SHARING SYSTEM Dr.S. DHANALAKSHMI 1, R. ANUPRIYA 2 1 Prof & Head, 2 Research Scholar Computer Science and Applications, Vivekanandha College of Arts and Sciences

More information

Natural Language Querying for Content Based Image Retrieval System

Natural Language Querying for Content Based Image Retrieval System Natural Language Querying for Content Based Image Retrieval System Sreena P. H. 1, David Solomon George 2 M.Tech Student, Department of ECE, Rajiv Gandhi Institute of Technology, Kottayam, India 1, Asst.

More information

Content-Based Image Retrieval for Digital Forensics

Content-Based Image Retrieval for Digital Forensics Content-Based Image Retrieval for Digital Forensics Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao Department of Computer Science University of New Orleans New Orleans, LA 70148 {yixin, vassil,

More information

A World Wide Web Based Image Search Engine Using Text and Image Content Features

A World Wide Web Based Image Search Engine Using Text and Image Content Features A World Wide Web Based Image Search Engine Using Text and Image Content Features Bo Luo, Xiaogang Wang, and Xiaoou Tang Department of Information Engineering The Chinese University of Hong Kong ABSTRACT

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

Peer-to-Peer Systems: "A Shared Social Network"

Peer-to-Peer Systems: A Shared Social Network Peer-to-Peer Systems: "A Shared Social Network" Nguyen Hoang Anh Helsinki University of Technology hanguyen@cc.hut.fi Abstract In the last few years, the success of the Napster online music sharing program

More information

A Review on Efficient File Sharing in Clustered P2P System

A Review on Efficient File Sharing in Clustered P2P System A Review on Efficient File Sharing in Clustered P2P System Anju S Kumar 1, Ratheesh S 2, Manoj M 3 1 PG scholar, Dept. of Computer Science, College of Engineering Perumon, Kerala, India 2 Assisstant Professor,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Multicast vs. P2P for content distribution

Multicast vs. P2P for content distribution Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution

More information

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network

Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network Tim Schattkowsky Paderborn University, C-LAB, D-33102 Paderborn, Germany tim@c-lab.de Abstract. Network infrastructures are nowadays

More information

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004.

Overlay Networks. Slides adopted from Prof. Böszörményi, Distributed Systems, Summer 2004. Overlay Networks An overlay is a logical network on top of the physical network Routing Overlays The simplest kind of overlay Virtual Private Networks (VPN), supported by the routers If no router support

More information

HollyShare: Peer-to-Peer File Sharing Application

HollyShare: Peer-to-Peer File Sharing Application HollyShare: Peer-to-Peer File Sharing Application ICS 243A Class Project Songmei Han Bijit Hore Ilya Issenin Sean McCarthy Shannon Tauro HollyShare Project: Final Report 1 INTRODUCTION...3 SURVEY...5 Architecture

More information

Simulating a File-Sharing P2P Network

Simulating a File-Sharing P2P Network Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance

More information

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining

ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,

More information

YouServ: A Web Hosting and Content Sharing Tool for the Masses

YouServ: A Web Hosting and Content Sharing Tool for the Masses YouServ: A Web Hosting and Content Sharing Tool for the Masses Roberto Bayardo IBM Almaden Research Center Joint work with Rakesh Agrawal, Daniel Gruhl, and Amit Somani Goal Allow people to easily share

More information

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network

Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Hierarchical Content Routing in Large-Scale Multimedia Content Delivery Network Jian Ni, Danny H. K. Tsang, Ivan S. H. Yeung, Xiaojun Hei Department of Electrical & Electronic Engineering Hong Kong University

More information

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems

GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems GISP: Global Information Sharing Protocol a distributed index for peer-to-peer systems Daishi Kato Computer Science Department, Stanford University Visiting from NEC Corporation Abstract This paper proposes

More information

AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS

AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS AN ENVIRONMENT FOR EFFICIENT HANDLING OF DIGITAL ASSETS PAULO VILLEGAS, STEPHAN HERRMANN, EBROUL IZQUIERDO, JONATHAN TEH AND LI-QUN XU IST BUSMAN Project, www.ist-basman.org We present a system designed

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

Research on P2P-SIP based VoIP system enhanced by UPnP technology

Research on P2P-SIP based VoIP system enhanced by UPnP technology December 2010, 17(Suppl. 2): 36 40 www.sciencedirect.com/science/journal/10058885 The Journal of China Universities of Posts and Telecommunications http://www.jcupt.com Research on P2P-SIP based VoIP system

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE.,

AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM. Dr. T.Ravichandran, B.E (ECE), M.E(CSE), Ph.D., MISTE., AN EFFICIENT LOAD BALANCING ALGORITHM FOR A DISTRIBUTED COMPUTER SYSTEM K.Kungumaraj, M.Sc., B.L.I.S., M.Phil., Research Scholar, Principal, Karpagam University, Hindusthan Institute of Technology, Coimbatore

More information

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic

Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic Trace Driven Analysis of the Long Term Evolution of Gnutella Peer-to-Peer Traffic William Acosta and Surendar Chandra University of Notre Dame, Notre Dame IN, 46556, USA {wacosta,surendar}@cse.nd.edu Abstract.

More information

A Topology-Aware Relay Lookup Scheme for P2P VoIP System

A Topology-Aware Relay Lookup Scheme for P2P VoIP System Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme

More information

International Journal of Combined Research & Development (IJCRD ) eissn:2321-225x; pissn:2321-2241 Volume: 2; Issue: 5; May -2014

International Journal of Combined Research & Development (IJCRD ) eissn:2321-225x; pissn:2321-2241 Volume: 2; Issue: 5; May -2014 A REVIEW ON CONTENT AWARE LOAD BALANCING IN CLOUD WEB SERVERS Rajeev Kumar Student, CSE, Institute of Engg & Technology (IET) Alwar, Rajasthan Rajasthan Technical University, Kota, Rajasthan Email Id:

More information

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities

Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland marcin.matuszewski@nokia.com, esko.kokkonen@nokia.com Abstract This

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing

Department of Computer Science Institute for System Architecture, Chair for Computer Networks. File Sharing Department of Computer Science Institute for System Architecture, Chair for Computer Networks File Sharing What is file sharing? File sharing is the practice of making files available for other users to

More information

LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH

LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH LOAD BALANCING FOR OPTIMAL SHARING OF NETWORK BANDWIDTH S.Hilda Thabitha 1, S.Pallavi 2, P.Jesu Jayarin 3 1 PG Scholar,,Dept of CSE,Jeppiaar Engineering College,Chennai, 2 Research Scholar,Sathyabama University,Chennai-119.

More information

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning

Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Peer-to-Peer: an Enabling Technology for Next-Generation E-learning Aleksander Bu lkowski 1, Edward Nawarecki 1, and Andrzej Duda 2 1 AGH University of Science and Technology, Dept. Of Computer Science,

More information

Improving Gnutella Protocol: Protocol Analysis And Research Proposals

Improving Gnutella Protocol: Protocol Analysis And Research Proposals Improving Gnutella Protocol: Protocol Analysis And Research Proposals Igor Ivkovic Software Architecture Group (SWAG) Department of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1 Canada

More information

Tornado: A Capability-Aware Peer-to-Peer Storage Network

Tornado: A Capability-Aware Peer-to-Peer Storage Network Tornado: A Capability-Aware Peer-to-Peer Storage Network Hung-Chang Hsiao hsiao@pads1.cs.nthu.edu.tw Chung-Ta King* king@cs.nthu.edu.tw Department of Computer Science National Tsing Hua University Hsinchu,

More information

Peer-to-Peer Replication

Peer-to-Peer Replication Peer-to-Peer Replication Matthieu Weber September 13, 2002 Contents 1 Introduction 1 2 Database Replication 2 2.1 Synchronous Replication..................... 2 2.2 Asynchronous Replication....................

More information

P2P: centralized directory (Napster s Approach)

P2P: centralized directory (Napster s Approach) P2P File Sharing P2P file sharing Example Alice runs P2P client application on her notebook computer Intermittently connects to Internet; gets new IP address for each connection Asks for Hey Jude Application

More information

A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia

A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia A Self-Managing SIP-based IP Telephony System based on a P2P approach using Kademlia Felipe de Castro Louback Rocha 1, Linnyer Beatriz 1 Programa de Pós Graduação em Engenharia Elétrica, Universidade Federal

More information

High Performance Cluster Support for NLB on Window

High Performance Cluster Support for NLB on Window High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) arvindrathi88@gmail.com [2]Asst. Professor,

More information

A Measurement Study of Peer-to-Peer File Sharing Systems

A Measurement Study of Peer-to-Peer File Sharing Systems CSF641 P2P Computing 點 對 點 計 算 A Measurement Study of Peer-to-Peer File Sharing Systems Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble Department of Computer Science and Engineering University

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

A reputation-based trust management in peer-to-peer network systems

A reputation-based trust management in peer-to-peer network systems A reputation-based trust management in peer-to-peer network systems Natalia Stakhanova, Sergio Ferrero, Johnny Wong, Ying Cai Department of Computer Science Iowa State University Ames, Iowa 50011 USA {

More information

Load Balancing Web Applications

Load Balancing Web Applications Mon Jan 26 2004 18:14:15 America/New_York Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2001/09/26/load.html See this if you're having trouble printing

More information

Efficient DNS based Load Balancing for Bursty Web Application Traffic

Efficient DNS based Load Balancing for Bursty Web Application Traffic ISSN Volume 1, No.1, September October 2012 International Journal of Science the and Internet. Applied However, Information this trend leads Technology to sudden burst of Available Online at http://warse.org/pdfs/ijmcis01112012.pdf

More information

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks

DUP: Dynamic-tree Based Update Propagation in Peer-to-Peer Networks : Dynamic-tree Based Update Propagation in Peer-to-Peer Networks Liangzhong Yin and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University University Park, PA 16802

More information

Distributed Hash Tables in P2P Systems - A literary survey

Distributed Hash Tables in P2P Systems - A literary survey Distributed Hash Tables in P2P Systems - A literary survey Timo Tanner Helsinki University of Technology tstanner@cc.hut.fi Abstract Distributed Hash Tables (DHT) are algorithms used in modern peer-to-peer

More information

MediaManager: A Distributed Multimedia Management System for Content-Based Retrieval, Authoring and Presentation

MediaManager: A Distributed Multimedia Management System for Content-Based Retrieval, Authoring and Presentation MediaManager: A Distributed Multimedia Management System for Content-Based Retrieval, Authoring and Presentation Shu-Ching Chen 1, Mei-Ling Shyu 2, Na Zhao 1 1 Distributed Multimedia Information System

More information

An Introduction to Peer-to-Peer Networks

An Introduction to Peer-to-Peer Networks An Introduction to Peer-to-Peer Networks Presentation for MIE456 - Information Systems Infrastructure II Vinod Muthusamy October 30, 2003 Agenda Overview of P2P Characteristics Benefits Unstructured P2P

More information

Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System

Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing

Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing Peer-VM: A Peer-to-Peer Network of Virtual Machines for Grid Computing (Research Proposal) Abhishek Agrawal (aagrawal@acis.ufl.edu) Abstract This proposal discusses details about Peer-VM which is a peer-to-peer

More information

A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING

A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING A THREE-TIERED WEB BASED EXPLORATION AND REPORTING TOOL FOR DATA MINING Ahmet Selman BOZKIR Hacettepe University Computer Engineering Department, Ankara, Turkey selman@cs.hacettepe.edu.tr Ebru Akcapinar

More information

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

WebRTC: Why and How? FRAFOS GmbH. FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC: Why and How? FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This docume nt is copyright of FRAFOS GmbH. Duplication or propagation or e xtracts

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Connecting P2P to the Web: A Gnutella-WWW Gateway

Connecting P2P to the Web: A Gnutella-WWW Gateway Connecting P2P to the Web: A Gnutella-WWW Gateway Brian D. Davison, Wei Zhang and Baoning Wu Department of Computer Science & Engineering, Lehigh University 19 Memorial Dr. West, Bethlehem, PA 18015 USA

More information

Peer-to-Peer File Sharing

Peer-to-Peer File Sharing The Effects of File Sharing on a Service Provider's Network An Industry White Paper Copyright July 2002, Sandvine Incorporated www.sandvine.com 408 Albert Street Waterloo, Ontario Canada N2L 3V3 Executive

More information

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha

IPTV AND VOD NETWORK ARCHITECTURES. Diogo Miguel Mateus Farinha IPTV AND VOD NETWORK ARCHITECTURES Diogo Miguel Mateus Farinha Instituto Superior Técnico Av. Rovisco Pais, 1049-001 Lisboa, Portugal E-mail: diogo.farinha@ist.utl.pt ABSTRACT IPTV and Video on Demand

More information

Load Balancing in Structured P2P Systems

Load Balancing in Structured P2P Systems 1 Load Balancing in Structured P2P Systems Ananth Rao Karthik Lakshminarayanan Sonesh Surana Richard Karp Ion Stoica ananthar, karthik, sonesh, karp, istoica @cs.berkeley.edu Abstract Most P2P systems

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure Peer-to-Peer

More information

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization

Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Back-End Forwarding Scheme in Server Load Balancing using Client Virtualization Shreyansh Kumar School of Computing Science and Engineering VIT University Chennai Campus Parvathi.R, Ph.D Associate Professor-

More information

A multi-agent algorithm to improve content management in CDN networks

A multi-agent algorithm to improve content management in CDN networks A multi-agent algorithm to improve content management in CDN networks Agostino Forestiero, forestiero@icar.cnr.it Carlo Mastroianni, mastroianni@icar.cnr.it ICAR-CNR Institute for High Performance Computing

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications

Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Mining Signatures in Healthcare Data Based on Event Sequences and its Applications Siddhanth Gokarapu 1, J. Laxmi Narayana 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India 1

More information

New Structured P2P Network with Dynamic Load Balancing Scheme

New Structured P2P Network with Dynamic Load Balancing Scheme New Structured P2P Network with Dynamic Load Balancing Scheme Atushi TAKEDA, Takuma OIDE and Akiko TAKAHASHI Department of Information Science, Tohoku Gakuin University Department of Information Engineering,

More information

A Tool for Evaluation and Optimization of Web Application Performance

A Tool for Evaluation and Optimization of Web Application Performance A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 cernyto3@fel.cvut.cz Michael J. Donahoo 2 jeff_donahoo@baylor.edu Abstract: One of the main goals of web application

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Evolution of Peer-to-Peer Systems

Evolution of Peer-to-Peer Systems EE 657 Lecture 9 on Sept. 28, 2007 Evolution of Peer-to-Peer Systems Peer-To-Peer Computing: Part 1 : P2P Platforms, Overlay Networks, and Gnutella Prof. kai Hwang University of Southern California Taylor

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

An Interactive 3D Visualization for Content-Based Image Retrieval

An Interactive 3D Visualization for Content-Based Image Retrieval An Interactive 3D Visualization for Content-Based Image Retrieval Munehiro Nakazato and Thomas S. Huang Beckman Institute for Advanced Science and Technology University of Illinois at Urbana-Champaign,

More information

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems. Distributed Web-Based Systems. Multi-tiered architectures

Distributed Systems Principles and Paradigms. Chapter 12: Distributed Web-Based Systems. Distributed Web-Based Systems. Multi-tiered architectures Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science steen@cs.vu.nl Chapter 12: Version: December 10, 2012 1 / 19 Distributed -based systems Essence The WWW

More information

MusicGuide: Album Reviews on the Go Serdar Sali

MusicGuide: Album Reviews on the Go Serdar Sali MusicGuide: Album Reviews on the Go Serdar Sali Abstract The cameras on mobile phones have untapped potential as input devices. In this paper, we present MusicGuide, an application that can be used to

More information

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com

FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or

More information

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD.

HUAWEI OceanStor 9000. Load Balancing Technical White Paper. Issue 01. Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. HUAWEI OceanStor 9000 Load Balancing Technical Issue 01 Date 2014-06-20 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2014. All rights reserved. No part of this document may be

More information

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets

Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets Analysis on Leveraging social networks for p2p content-based file sharing in disconnected manets # K.Deepika 1, M.Tech Computer Science Engineering, Mail: medeepusony@gmail.com # K.Meena 2, Assistant Professor

More information

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002 Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering

More information

Decentralized Service Discovery Approach Using Dynamic Virtual Server

Decentralized Service Discovery Approach Using Dynamic Virtual Server Decentralized Service Discovery Approach Using Virtual N.Aravindhu 1, C.Shalini 2, R.Jayalakshmi 3, S.Priyavadhani 4 Assistant Professor, Department of Computer Science, Christ College of Eng. and Technology,

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1

Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1 Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Load Balancing using Pramati Web Load Balancer

Load Balancing using Pramati Web Load Balancer Load Balancing using Pramati Web Load Balancer Satyajit Chetri, Product Engineering Pramati Web Load Balancer is a software based web traffic management interceptor. Pramati Web Load Balancer offers much

More information

Efficient File Sharing Scheme in Mobile Adhoc Network

Efficient File Sharing Scheme in Mobile Adhoc Network Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:

More information

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment

A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment Weisong Chen, Cho-Li Wang, and Francis C.M. Lau Department of Computer Science, The University of Hong Kong {wschen,

More information

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall

Table of Contents. Cisco Blocking Peer to Peer File Sharing Programs with the PIX Firewall Table of Contents Blocking Peer to Peer File Sharing Programs with the PIX Firewall...1 Document ID: 42700...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...2 PIX

More information

Distributed Systems Lecture 1 1

Distributed Systems Lecture 1 1 Distributed Systems Lecture 1 1 Distributed Systems Lecturer: Therese Berg therese.berg@it.uu.se. Recommended text book: Distributed Systems Concepts and Design, Coulouris, Dollimore and Kindberg. Addison

More information